Static task
static1
Behavioral task
behavioral1
Sample
8c08664fb9af79a680492e58542443877f9babb764c66e59d36c32bbff5806d0.exe
Resource
win7-20231215-en
General
-
Target
8c08664fb9af79a680492e58542443877f9babb764c66e59d36c32bbff5806d0
-
Size
1.1MB
-
MD5
4f24bc0ef40dedf3a245a108ad2590f5
-
SHA1
1b22e19df2138cbf5f628d2d04071640f7b276b5
-
SHA256
8c08664fb9af79a680492e58542443877f9babb764c66e59d36c32bbff5806d0
-
SHA512
3db0bfd398b7849676c1bbb11732e1cd3c02ff6ca447e631fdb39100cff11614d26d54f568b564de268259eacdb85d59050953ce30a291a61ef876b1ad4018d1
-
SSDEEP
24576:vsYN33VA33333V3333333A333333333333+1SF+5JwXgb1081v3iYYKLJxNk:vTF+bmgb1+cxC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8c08664fb9af79a680492e58542443877f9babb764c66e59d36c32bbff5806d0
Files
-
8c08664fb9af79a680492e58542443877f9babb764c66e59d36c32bbff5806d0.exe windows:6 windows x64 arch:x64
e3eb932b2db12c6be033ce03002d1ea0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcp140
?always_noconv@codecvt_base@std@@QEBA_NXZ
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??Bid@locale@std@@QEAA_KXZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
crypt32
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CertCloseStore
CryptQueryObject
CertFreeCertificateContext
CryptMsgClose
CryptDecodeObject
wintrust
WinVerifyTrust
shlwapi
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
mfc140u
ord6729
ord8656
ord14209
ord11625
ord3713
ord3718
ord11771
ord8830
ord11415
ord11414
ord2801
ord9979
ord9975
ord9977
ord9978
ord9976
ord1120
ord2346
ord2350
ord8900
ord9941
ord5555
ord6614
ord983
ord13545
ord6122
ord14289
ord6123
ord14290
ord6121
ord14288
ord7719
ord12212
ord14088
ord11665
ord11664
ord2011
ord7668
ord12625
ord3949
ord4011
ord9089
ord14216
ord7650
ord14210
ord12223
ord12222
ord10163
ord10070
ord5183
ord14360
ord7913
ord9946
ord3209
ord3212
ord9068
ord7716
ord4445
ord12544
ord12606
ord10124
ord11929
ord8084
ord1450
ord7393
ord8167
ord11901
ord11933
ord7920
ord11921
ord5706
ord3731
ord4511
ord7745
ord3726
ord1503
ord1033
ord296
ord7922
ord5227
ord7450
ord7461
ord7460
ord5062
ord5229
ord5083
ord5339
ord9041
ord5552
ord5363
ord5080
ord2212
ord2187
ord878
ord10691
ord8947
ord3173
ord13513
ord11944
ord11940
ord1700
ord1722
ord1748
ord1734
ord1755
ord4776
ord3951
ord4843
ord3308
ord4788
ord3307
ord4806
ord3071
ord4800
ord446
ord4794
ord6285
ord4853
ord4837
ord4782
ord4656
ord5676
ord4859
ord4814
ord4752
ord4767
ord4828
ord4360
ord5582
ord9384
ord4352
ord2967
ord14211
ord7651
ord14217
ord6631
ord11406
ord13354
ord5723
ord13767
ord2629
ord11806
ord3812
ord3279
ord3278
ord3172
ord11850
ord4726
ord8468
ord7233
ord10727
ord11813
ord6000
ord13397
ord2697
ord8901
ord11854
ord1089
ord8731
ord10704
ord8023
ord488
ord11085
ord2439
ord11644
ord2370
ord5451
ord1369
kernel32
DeleteCriticalSection
GetPackageFullName
WritePrivateProfileStringW
GetPackageId
GetPrivateProfileIntW
GetPackageFamilyName
GetProcessId
WaitForSingleObject
SetFileAttributesW
GetPrivateProfileStringW
SystemTimeToFileTime
GetPackagePathByFullName
VirtualAllocEx
ReadProcessMemory
GetCurrentProcessId
GlobalMemoryStatusEx
QueryFullProcessImageNameW
VirtualFreeEx
SetProcessWorkingSetSize
LocalFree
CloseHandle
GetLastError
OpenProcess
InitializeCriticalSectionEx
Sleep
FileTimeToLocalFileTime
GetProcessHeap
FileTimeToSystemTime
OutputDebugStringW
lstrcmpA
SetLastError
DeleteFileW
HeapAlloc
SetDefaultDllDirectories
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleHandleA
GetCurrentProcess
GetLocalTime
CreateFileW
GetModuleHandleW
GetProcAddress
GetSystemInfo
CreateMutexW
HeapFree
user32
GetWindowTextW
EnableWindow
GetParent
GetClientRect
SetRectEmpty
GetClassNameW
FindWindowW
LoadIconW
TranslateMessage
EnumWindows
IsWindowEnabled
CopyRect
GetKeyState
DrawIcon
GetWindowLongW
GetWindowThreadProcessId
GetSystemMetrics
PostMessageW
FindWindowExW
GetWindowRect
IsWindowVisible
EnumChildWindows
SendMessageW
IsIconic
advapi32
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
shell32
ShellExecuteExW
SHGetFolderPathW
comctl32
InitCommonControlsEx
ole32
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitializeSecurity
CoInitializeEx
oleaut32
SysAllocString
VariantClear
SysFreeString
psapi
EnumProcessModules
GetModuleBaseNameW
EnumProcesses
QueryWorkingSet
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeExW
vcruntime140
memmove
_CxxThrowException
memset
__std_exception_copy
__std_exception_destroy
__std_terminate
__C_specific_handler
__CxxFrameHandler3
memcpy
api-ms-win-crt-stdio-l1-1-0
__p__commode
__stdio_common_vsscanf
_wfopen
__stdio_common_vswprintf_s
__stdio_common_vsnwprintf_s
_get_stream_buffer_pointers
_fseeki64
fread
fsetpos
ungetc
setvbuf
fgetpos
fwrite
__acrt_iob_func
fgetc
__stdio_common_vfprintf
__stdio_common_vfwprintf
fclose
fflush
fputc
_set_fmode
api-ms-win-crt-string-l1-1-0
wcsncpy_s
_wcsicmp
wcstok_s
wcscpy_s
_wcsnicmp
_stricmp
strncpy_s
api-ms-win-crt-runtime-l1-1-0
_initialize_wide_environment
_invalid_parameter_noinfo_noreturn
_seh_filter_exe
terminate
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_set_app_type
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
_configure_wide_argv
_exit
_initterm_e
_initterm
_get_wide_winmain_command_line
exit
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
realloc
_set_new_mode
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_unlock_file
_wmkdir
_wremove
_wsplitpath_s
api-ms-win-crt-convert-l1-1-0
_itow_s
wcstol
api-ms-win-crt-time-l1-1-0
_mktime64
_localtime64_s
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 448KB - Virtual size: 448KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE